Network basics: Telnet Server

Source: Internet
Author: User
Tags dedicated server

Telnet means remote logon. So how do we connect to the Telnet server? Let's take a look at the Basic remote logon concepts. First, let's look at the figure below in the login. This figure shows remote logon.

Remote Login

Although the Telnet service is also a client/server model service, it is more significant in implementing Telnet-based remote login interactive computing ), so let's get to know about remote logon.

1. Basic concepts of Remote Login

First, let's take a look at what is Logon: the time-sharing system allows multiple users to use a computer at the same time. To ensure system security and ease of accounting, the system requires each user to have a separate account as the logon ID, the system also specifies a password for each user. Before using the system, you need to enter the ID and password. This process is called "Logon '.

Remote Login refers to the process in which a user uses Telnet commands to temporarily turn his computer into a simulation terminal of the remote host. The simulation terminal is equivalent to a non-intelligent machine. It is only responsible for passing each character entered by the user to the host, and then displaying each information output by the host on the screen.

2 Remote Login generation and development

We can first create a remote text editing service. The implementation of this service requires a server that accepts the file editing request and data, and a client that sends this request. The client will establish a TCP connection from the local machine to the server. Of course, this requires the server to respond and then send the entered information file to the server to edit the information) and read the output from the server. The above is a standard and common client/server model service.

It seems that with the client/server model service, all remote problems can be solved. However, it is not as simple as you think. If we only need to edit files remotely, the service we just proposed is fully qualified, but if our requirements are not that simple, we also want to implement remote user management, remote data entry, remote system maintenance, and all operations that can be performed on the remote host, then we will need a large number of dedicated server programs and use a server process for every computing service. The problem that comes with it is that remote machines will soon be overwhelmed by server processes, and we excluded the most specialized remote machines from the ocean of processes ).

Is there a solution? Of course, we can use remote logon to solve all this problem. We allow users to establish a login session on a remote machine and execute commands to implement more general services, just like local operations. In this way, we can access all the available commands on the remote system, and the system designer does not need to provide multiple dedicated server programs.

The problem seems to have a bright future. Remote Login should solve the problem, but it is not easy to achieve remote login. Regardless of the computer system designed by the network, you are expected to log on only from the directly connected keyboard and display. To add the remote login function to this computer, you need to modify the operating system of the machine, this is extremely difficult and we try to avoid it. Therefore, we should concentrate on the construction of remote login server software, although this is also relatively difficult. Why is it difficult to do so?

For example, the operating system assigns special meanings to some special buttons. For example, the local system interprets 'ctrl + C' as 'terminating the currently running command process '. However, if we have run the remote login server software, 'ctrl + C' may not be transferred to the remote machine, if the client actually uploads 'ctrl + C' to the remote machine, the 'ctrl + C' command may not terminate the local process, that is, confusion may occur here. This is only one of the difficulties encountered.

However, despite the technical difficulties, system programmers managed to construct remote login server software that can be applied to most operating systems and constructed application software that acts as a client. Generally, the client software removes the local interpretations of all keys except one key and converts these local interpretations into remote interpretations, this makes the interaction between the client software and the remote machine just like sitting in front of the remote host, thus avoiding the confusion mentioned above. The key with the only exception can bring the user back to the local environment.

The remote login server is designed as an application-level software. Another requirement is that the operating system must provide support for the pseudo terminal. We use a Pseudo Terminal to describe the entry point of the operating system. It allows programs like the Telnet server to send characters to the operating system and make the characters as if they were from a local keyboard. Only when such an operating system is used can the remote login server be designed as application-level software such as Telnet server software). Otherwise, local and remote system transfer will not recognize the information sent from the other party because they can only identify the information typed from the local keyboard), remote login will fail.

Although the Design of Remote Login server as application-level software has significant advantages: it is easier to modify and control the server than to embed code into the operating system. However, the disadvantages of low efficiency will be explained later). Fortunately, this design is acceptable because the user's input speed is not high.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.